1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elan Coil [88]
3 years ago
10

Do routers have ip addresses? if so, how many?

Computers and Technology
1 answer:
Gwar [14]3 years ago
7 0
<span>Yes, one per router interface, so at the very least 2.</span>
You might be interested in
It is used to select specific menu options, drag and drop options and to draw something on screen.
Novay_Z [31]

Answer:

A mouse.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.

A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.

8 0
3 years ago
What is network hardware?
vovangra [49]
Modem, router, switch, server, etc. these are hardware meant to facilitate the transfer or storage of remote information.
8 0
3 years ago
Which of the following software program provides for email communication
olga2289 [7]
If "Outlook" is one of the options then thats the answer.
6 0
3 years ago
Read 2 more answers
In which way is a worm different from a virius
dangina [55]
A worm as a multicell organism, but a virus is a single cell.
3 0
3 years ago
What is a privacy data breach
kotykmax [81]

Answer: A privacy data breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority. A privacy breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority.

Explanation:

Examples of a  data breach might include:

Loss or theft of hard copy notes, USB drives, computers or mobile devices. an unauthorized person gaining access to your laptop, email account or computer network. sending an email with personal data to the wrong person.

7 0
1 year ago
Other questions:
  • When performing conflict management, it is important to identify your;
    6·1 answer
  • What types of tools are used in the process of a digital or network investigation?
    12·1 answer
  • I prefer a job where I am praise for good performance or I am accountable for results
    13·1 answer
  • One key feature of malware is that it:
    13·1 answer
  • _____the measuring instrument is not necssery​
    10·1 answer
  • Kos-huar-utb garls jonly​
    8·2 answers
  • I need help for my computer science class I would appreciate it
    11·1 answer
  • The reason why our computers can get faster without getting bigger is because of...
    14·1 answer
  • Polynomial regression A common misconception is that linear regression can only be used to fit a linear relationship. We can fit
    11·1 answer
  • Computers that are joined together are called networks true or false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!